Description
admin/upload.php in le.cms 1.4 and earlier allows remote attackers to bypass administrative authentication, and upload and execute arbitrary files in images/, via a nonzero value for the submit0 parameter in conjunction with filenames in the filename and upload parameters.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by t0pP8uZz · perlwebappsphp
https://www.exploit-db.com/exploits/5887
References (5)
Core 5
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5887
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/29872
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30797
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/29867
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43274
Scores
EPSS
0.0442
EPSS Percentile
89.1%
Details
CWE
CWE-287
Status
published
Products (1)
worldlevel/le.cms
< 1.4
Published
Jun 24, 2008
Tracked Since
Feb 18, 2026